Description:
Several vulnerabilities were reported in Mac OS X. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can intercept TLS/SSL connections. A remote user can impersonate certain domain names.

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a heap overflow in CoreGraphics and execute arbitrary code on the target system [CVE-2010-1801].

Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team (VDT) reported this vulnerability.

A remote user can create a document containing a specially crafted embedded font that, when viewed or downloaded, will trigger a stack overflow in Apple Type Services and execute arbitrary code on the target system [CVE-2010-1808].

A remote user with the ability to conduct man-in-the-middle attacks can redirect and intercept TLS/SSL connections to obtain user authentication credentials and potentially sensitive information [CVE-2010-1800]. Version prior to 10.6.3 are not affected. The Apple Mail application is not affected.

APPLE-SA-2010-08-24-1 Security Update 2010-005
CFNetwork
CVE-ID: CVE-2010-1800
Available for: Mac OS X v10.6.4, Mac OS X Server v10.6.4
Impact: An attacker with a privileged network position may intercept
user credentials or other sensitive information
Description: CFNetwork permits anonymous TLS/SSL connections. This
may allow a man-in-the-middle attacker to redirect connections and
intercept user credentials or other sensitive information. This issue
does not affect the Mail application. This issue is addressed by
disabling anonymous TLS/SSL connections. This issue does not affect
systems prior to Mac OS X v10.6.3. Credit to Tomas Bjurman of Sirius
IT, Jean-Luc Giraud of Citrix, and Aaron Sigel of vtty.com for
reporting this issue.
CoreGraphics
CVE-ID: CVE-2010-1801
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.4, Mac OS X Server v10.6.4
Impact: Opening a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in CoreGraphics' handling
of PDF files. Opening a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution. This
issue is addressed through improved bounds checking. Credit to
Rodrigo Rubira Branco from the Check Point Vulnerability Discovery
Team (VDT) for reporting this issue.
libsecurity
CVE-ID: CVE-2010-1802
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.4, Mac OS X Server v10.6.4
Impact: An attacker in a privileged network position who can obtain
a domain name that differs only in the last characters from the name
of a legitimate domain may impersonate hosts in that domain
Description: An issue exists in the handling of certificate host
names. For host names containing three or more components, the last
characters are not properly compared. In the case of a name
containing exactly three components, only the last character is not
checked. For example, if an attacker in a privileged network position
could obtain a certificate for www.example.con the attacker can
impersonate www.example.com. This issue is addressed through improved
handling of certificate host names. Credit to Peter Speck for
reporting this issue.
ATS
CVE-ID: CVE-2010-1808
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.4, Mac OS X Server v10.6.4
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: A stack buffer overlow exists in Apple Type Services'
handling of embedded fonts. Viewing or downloading a document
containing a maliciously crafted embedded font may lead to arbitrary
code execution. This issue is addressed through improved bounds
checking.